|Publication number||US5541991 A|
|Application number||US 08/392,024|
|Publication date||Jul 30, 1996|
|Filing date||Feb 21, 1995|
|Priority date||Jul 19, 1991|
|Also published as||CA2074121A1, CA2074121C|
|Publication number||08392024, 392024, US 5541991 A, US 5541991A, US-A-5541991, US5541991 A, US5541991A|
|Inventors||Lawrence D. Benson, Brian P. Gill, Timothy E. Gill|
|Original Assignee||Quark, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (5), Non-Patent Citations (4), Referenced by (46), Classifications (7), Legal Events (14)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is a file wrapper continuation of application Ser. No. 08/132,782, filed Oct. 7, 1993, which is a continuation of application Ser. No. 07/732,719, filed Jul. 19, 1991 both abandoned.
The present invention relates to a system and method for selectively preventing a software program from being operable.
Businessmen constantly seek direct communications with their customers for the purpose of understanding their customers' present and future needs, tailoring a product or service to help fulfill those needs, and providing better maintenance and follow-up service. It is often very difficult for suppliers of widely distributed products and services to ascertain the identities of their ultimate customers, and it is usually very expensive to initiate and maintain communications with those customers. Most businessmen resort to a statistical sampling survey of a small fraction of their customers or feedback from their distributors about how best to serve their potential customers.
Some companies have attempted to have customers complete various questionnaires upon purchasing a product or service, whenever a maintenance or service person visits the customer, etc. Such questionnaire techniques are perceived by the customers as a nuisance intruding upon their valuable time, are sometimes incompletely filled out, and are often misplaced.
Consequently, there is a need to obtain accurate, complete, valuable information directly from customers with a minimal inconvenience to the customer.
The present invention relates to a system and method for selectively preventing a primary computer software program from being operable until a separate, secondary computer software program posing questions to the potential user of the primary computer software program has received answers to the questions using the keyboard of the computer. The system visually displays the questions from the secondary computer software program, determines whether the answers to the questions have been entered through the computer keyboard, and then selectively permits the primary computer software program to be operable on the computer. The user responses are recorded in some convenient form for transmittal to the company. The form of transmittal may be printed, though recording on magnetic media or transmission by other electronic means is preferable.
FIGS. 1A and 1B is a flow chart illustrating the method of the present invention.
FIG. 2 is a flow chart illustrating the operation of a computer program for compressing and decompressing another computer program.
The present invention relates to a system for selectively preventing a software program from being operable on a computer. In a preferred embodiment, the computer is a "Macintosh" brand, made by Apple Computer, Inc. The software application program to be selectively prevented from being operable on the Macintosh computer is the "QuarkXPress" brand electronic publishing software program produced and distributed by Quark, Inc. of Denver, Colo., U.S.A. It should be noted that a wide variety of other computers and application programs may be utilized in conjunction with the present invention. Preferably, the computer system will include an output device such as a conventional visual display screen for presenting information to a user, an input device such as a conventional keyboard, a program entry device such as a conventional floppy disk drive, and a mass storage unit such as a conventional hard disk drive.
Normally, a customer can purchase application program software encoded on a magnetic disk, place the disk in the disk drive of a computer and immediately operate the program in accordance with a standard instruction or user's manual. In the present invention, the primary, or application program software is modified by placing a compressed copy of the application program into the file containing the secondary, or registration program. Compression of the application program can be achieved utilizing a variety of compression schemes such as the Huffman compression algorithm which is utilized in the embodiment described hereinafter. Additionally, a simple encryption system may be employed if the compression step is deemed unnecessary. FIG. 2 shows a flow chart illustrating the operation of the compression program. Compression of the application program into a non-executable code form prevents the application program from being operated until the application program is decompressed during installation, placing a copy of the application program in an executable code form on the user's hard disk drive. Such modification prevents the application program from being immediately operable in the computer.
The application program may be made operable by first inserting into the computer program entry device, for example a floppy disk drive, a magnetic disk encoded with a separate software program which, for convenience, will be termed a "registration" program. It should be noted that the programs may be provided on other types of media, compatible with the particular type of program entry device of the computer system. The magnetic disk containing the registration program may be the same magnetic disk containing the application program, or a plurality of disks may be employed. As may be understood with reference to the flow chart depicted in FIGS. 1A and 1B, the registration program checks a configuration file recorded on the magnetic disk containing the registration program to determine if the application program has been previously installed. If a first time installation is detected, the registration program creates a visual display that includes a "splash" screen that tells the user of the computer about the purpose of the registration program and how to comply with the registration program in order to make the application program operable on the computer. The registration program may be utilized in conjunction with an initial installation of an application program, and also in conjunction with the updating of a particular application program upon release of a new version by the software manufacturer.
The splash screen includes a menu of categories of questions for the user to answer. For example, one category might be entitled "registration information" and questions within that category ask the user about the user's company name, address, telephone number, etc. Another category of questions might be entitled "extended warranty information" and specific questions might ask the user whether the user wants to receive maintenance services or upgrades for a certain cost for a certain period of time after the normal warranty expires, and if so, it would ask the user how payment for the maintenance costs will be made, whether by check, a particular type of credit card, etc. Still another category might be entitled "system information" and questions within that category might ask the user about the hardware components of the computer system upon which the application program is to be installed. Some system information, such as the number of serial and parallel ports, number and types of disk drives, monitor type, processor type, memory size and system B.I.O.S. date may be obtained directly from the computer system by the registration program, without user query or input. Yet another category of questions might be entitled "marketing information" and might include questions about when, from whom, and where the user purchased the application program, how the user learned about the application program, the type of business in which the user is engaged, how the user expects to use the application program, the types of other computer equipment and software programs used by the user, etc. Obviously, these type of questions are virtually limitless. Additionally, is should be noted that other formats may be utilized to elicit the specific information desired from the user. For example, the registration program may cause display of one or more forms to be filled out by the user. The registration program should be designed to minimize the inconvenience to a user and therefore should be relatively short and should be fun, like a game. The registration program directs the user to answer all of the questions or to enter specified information by use of the computer keyboard, or other input device.
The system includes means for determining whether the user has entered answers to all the questions. The registration program checks that data has been entered into all mandatory fields and then verifies that the data has been entered in a correct format, according to predetermined verification parameters in the registration program. For the application program serial number, the check sum of the serial number entered is calculated and checked for validity. Dates entered are checked against the current date for validity. Phone numbers and zip codes are checked to make sure that they are in the correct format. Credit card numbers can be checked as well.
If the means for determining whether the user has answered all the questions determines that certain questions have not been answered, then the registration program can display a message indicating what questions still need to be answered in order for the user to permit the application program to be operated on the computer. If such determining means determines that the user has answered all the questions, then a file containing all of the specified user information entered, plus system information derived from the computer, is placed on a separate "user registration" disk asked for by the registration program. After the information is written to the user registration disk, the disk is removed from the disk drive. The registration program directs the user to return the user registration disk to the producer of the program at a designated remote location. To this end, a pre-addressed disk mailer may be provided with the software package, and some incentive offered to the user for return of the user registration disk. Return of the disk to the software producer allows the specified information from a large number of users to be easily and inexpensively collated and analyzed. Alternative modes of transmission of the recorded specified information to the designated remote location may also be employed. For example, the registration program may include a communications program operative to access a computer system at the designated remote location through a modem installed in the computer system of the user of the application program. The specified information is then transmitted through the modem to the remote computer system, and the remote computer system then transmits a verification code through the modem to the registration program, allowing installation of the application program.
The registration program then activates an installation program or routine, which places a copy of the application program onto the hard disk drive of the user's computer. The installation program utilizes a decompression algorithm such that the application program is transferred from storage in a non-executable code form on a floppy disk or disks to an executable code form on the hard disk drive. The user's name and product serial number will be encoded into the copy of the application program that is placed on the hard disk drive. If the information encoded into the application program is tampered with, the application program will not operate. This feature may be implemented by initially storing a checksum value of the user information in the application program and subsequently recalculating and verifying the checksum of the user information each time the application program is run. The installation program will also place copies of all other files required for proper operation of the application program on the user's hard disk drive. The user then removes the magnetic disk containing the registration information from the computer floppy disk drive.
The user may thereafter use the application program in the normal manner. The registration program may be used to install additional copies of the application program, possibly on other computers. Such installation may or may not require answering the questions again, depending on the needs of the software manufacturer. The application program may, however, use whatever additional means deemed appropriate for further restricting its use, such as, hardware protection keys or special key disks. It may also elect to restrict the number of simultaneous uses of the application program with a given serial number (or other identifier) which are permitted in a given system of networked computers.
Although particular embodiments of the present invention have been described and illustrated herein, it should be recognized that modifications and variations may readily occur to those skilled in the art and that such modifications and variations may be made without departing from the spirit and scope of my invention. Consequently, my invention as claimed below may be practiced otherwise than as specifically described above.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4924378 *||Jun 13, 1988||May 8, 1990||Prime Computer, Inc.||License mangagement system and license storage key|
|US4999806 *||Sep 4, 1987||Mar 12, 1991||Fred Chernow||Software distribution system|
|US5023907 *||Sep 30, 1988||Jun 11, 1991||Apollo Computer, Inc.||Network license server|
|US5103476 *||Nov 7, 1990||Apr 7, 1992||Waite David P||Secure system for activating personal computer software at remote locations|
|US5109413 *||Nov 28, 1989||Apr 28, 1992||International Business Machines Corporation||Manipulating rights-to-execute in connection with a software copy protection mechanism|
|1||*||DOS Mounter User s Guide; Mar. 91; pp. 5 8; Dayna Communications, Inc., Salt Lake City, Utah.|
|2||DOS Mounter User's Guide; Mar. '91; pp. 5-8; Dayna Communications, Inc., Salt Lake City, Utah.|
|3||*||MacIntosh System Software User s Guide Version 6.0; Apple computer, Inc., 1988; Cupertino, CA; pp. 209 211.|
|4||MacIntosh System Software User's Guide Version 6.0; Apple computer, Inc., 1988; Cupertino, CA; pp. 209-211.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US5710814 *||Jul 23, 1996||Jan 20, 1998||Cheyenne Property Trust||Cryptographic unit touch point logic|
|US5740248 *||Dec 19, 1996||Apr 14, 1998||Cheyenne Property Trust||Software level touchpoints for an international cryptography frameworks|
|US5793982 *||Dec 7, 1995||Aug 11, 1998||International Business Machine Corporation||Validating an installation plan containing multiple transports and redirectors by adding data structure of the modules to the plan if the indicated transport and redirector modules are unavailable|
|US6125388 *||Dec 1, 1997||Sep 26, 2000||Reisman; Richard R.||System for transporting information objects between a user station and multiple remote sources based upon user modifiable object manifest stored in the user station|
|US6134659 *||Nov 16, 1999||Oct 17, 2000||Sprong; Katherine A.||Controlled usage software|
|US6343280||Dec 15, 1998||Jan 29, 2002||Jonathan Clark||Distributed execution software license server|
|US6530019 *||Jun 12, 1996||Mar 4, 2003||Dell U.S.A., L.P.||Disk boot sector for software contract enforcement|
|US6549980||Jul 19, 2001||Apr 15, 2003||Dell Pruducts L.P.||Manufacturing process for software raid disk sets in a computer system|
|US6557054||Apr 20, 2000||Apr 29, 2003||Richard R. Reisman||Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station|
|US6594692||Apr 29, 1996||Jul 15, 2003||Richard R. Reisman||Methods for transacting electronic commerce|
|US6611862||Apr 20, 2000||Aug 26, 2003||Richard R. Reisman||User station software that controls transport and presentation of content from a remote source|
|US6658464||Apr 20, 2000||Dec 2, 2003||Richard R. Reisman||User station software that controls transport, storage, and presentation of content from a remote source|
|US6769009||Apr 20, 2000||Jul 27, 2004||Richard R. Reisman||Method and system for selecting a personalized set of information channels|
|US6959389 *||Aug 16, 2000||Oct 25, 2005||International Business Machines Corporation||Secure entry of a user-identifier in a publicly positioned device|
|US6986063||Feb 4, 2003||Jan 10, 2006||Z4 Technologies, Inc.||Method for monitoring software using encryption including digital signatures/certificates|
|US7315983||Jun 25, 2001||Jan 1, 2008||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7552444||May 21, 2004||Jun 23, 2009||International Business Machines Corporation||Method and apparatus for attaching an informational dialog to a java bean|
|US7653687||Jun 8, 2007||Jan 26, 2010||Reisman Richard R||Method for distributing content to a user station|
|US7665105||Oct 31, 2007||Feb 16, 2010||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7673237||Oct 31, 2007||Mar 2, 2010||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7698719||Oct 31, 2007||Apr 13, 2010||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7707081||Jul 18, 2007||Apr 27, 2010||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7725344||Dec 16, 2004||May 25, 2010||Csg Systems, Inc.||System and method for computer-aided technician dispatch and communication|
|US7774715||Dec 23, 2005||Aug 10, 2010||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US7890873||Oct 31, 2007||Feb 15, 2011||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US8024399||Aug 31, 2006||Sep 20, 2011||Twintech E.U., Limited Liability Company||Software distribution over a network|
|US8069204||Aug 31, 2006||Nov 29, 2011||Twintech E.U., Limited Liability Company||Providing and receiving content over a wireless communication system|
|US8090937 *||Nov 2, 2007||Jan 3, 2012||Dell Products L.P.||System and method for managing booting of an information handling system|
|US8091031||Jan 24, 2011||Jan 3, 2012||Ecomsystems, Inc.||System and method for computer-created advertisements|
|US8131883||Apr 20, 2000||Mar 6, 2012||Intellectual Ventures I, Limited Liability Company||Method for distributing content to a user station|
|US8285590||Jul 2, 2010||Oct 9, 2012||Ecomsystems, Inc.||Systems and methods for computer-created advertisements|
|US8296183||Jul 2, 2010||Oct 23, 2012||Ecomsystems, Inc.||System and method for dynamic layout intelligence|
|US8321499||Jun 8, 2007||Nov 27, 2012||Intellectual Ventures I Llc||Method for distributing content to a user station|
|US8407682||Oct 1, 2004||Mar 26, 2013||Intellectual Ventures I Llc||Software and method that enables selection of one of a plurality of online service providers|
|US8499030||Apr 20, 2000||Jul 30, 2013||Intellectual Ventures I Llc||Software and method that enables selection of one of a plurality of network communications service providers|
|US8635272||Apr 20, 2012||Jan 21, 2014||Intellectual Ventures I Llc||Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update|
|US8719339||Jul 21, 2010||May 6, 2014||Intellectual Ventures I Llc||Software and method that enables selection of one of a plurality of online service providers|
|US8812620||Oct 30, 2007||Aug 19, 2014||Intellectual Property I LLC||Software and method that enables selection of one of a plurality of online service providers|
|US8825872||Mar 9, 2009||Sep 2, 2014||Intellectual Ventures I Llc||Software and method for monitoring a data stream and for capturing desired data within the data stream|
|US8875196||Aug 11, 2006||Oct 28, 2014||Webtuner Corp.||System for network and local content access|
|US9021543||May 29, 2012||Apr 28, 2015||Webtuner Corporation||Highly scalable audience measurement system with client event pre-processing|
|US9111604||Aug 31, 2006||Aug 18, 2015||Intellectual Ventures I Llc||Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action|
|US20040117663 *||Sep 5, 2003||Jun 17, 2004||Z4 Technologies, Inc.||Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution|
|US20040216088 *||May 21, 2004||Oct 28, 2004||Alcorn John William||Method and apparatus for attaching an informational dialog to a Java bean|
|US20040225894 *||Sep 5, 2003||Nov 11, 2004||Z4 Technologies, Inc.||Hardware based method for digital rights management including self activating/self authentication software|
|US20050094772 *||Dec 16, 2004||May 5, 2005||Csg Systems, Inc.||System and method for computer-aided technician dispatch and communication|
|U.S. Classification||726/28, 713/183|
|International Classification||G06F9/445, G06F21/00, G06F1/00|
|Jan 28, 2000||FPAY||Fee payment|
Year of fee payment: 4
|Feb 18, 2004||REMI||Maintenance fee reminder mailed|
|Jul 30, 2004||REIN||Reinstatement after maintenance fee payment confirmed|
|Sep 28, 2004||FP||Expired due to failure to pay maintenance fee|
Effective date: 20040730
|Oct 15, 2004||SULP||Surcharge for late payment|
|Oct 15, 2004||FPAY||Fee payment|
Year of fee payment: 8
|Jul 18, 2005||PRDP||Patent reinstated due to the acceptance of a late maintenance fee|
Effective date: 20050720
|Jan 7, 2008||FPAY||Fee payment|
Year of fee payment: 12
|Nov 19, 2012||AS||Assignment|
Owner name: QUARK HOLDING CORPORATION, CALIFORNIA
Effective date: 20121112
Free format text: SECURITY AGREEMENT;ASSIGNOR:QUARK SOFTWARE, INC.;REEL/FRAME:029321/0776
|Dec 3, 2012||AS||Assignment|
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QUARK, INC.;REEL/FRAME:029393/0679
Owner name: QUARK ACQUISITION CORPORATION, COLORADO
Effective date: 20110801
|Dec 10, 2012||AS||Assignment|
Effective date: 20111207
Owner name: QUARK SOFTWARE, INC., COLORADO
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QUARK ACQUISITION CORPORATION;REEL/FRAME:029439/0226
|Dec 6, 2013||AS||Assignment|
Owner name: QUARK HOLDINGS, INC., MASSACHUSETTS
Free format text: SECURITY AGREEMENT;ASSIGNOR:QUARK ACQUISITION CORPORATION;REEL/FRAME:031768/0217
Effective date: 20110801
|Jan 15, 2014||AS||Assignment|
Effective date: 20111227
Owner name: Q LIQUIDATING TRUST, MASSACHUSETTS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:QH HOLDINGS CORPORATION;REEL/FRAME:031973/0394
Owner name: QH HOLDINGS CORPORATION, MASSACHUSETTS
Effective date: 20110810
Free format text: CHANGE OF NAME;ASSIGNOR:QUARK HOLDINGS, INC.;REEL/FRAME:032020/0142
|Oct 2, 2014||AS||Assignment|
Owner name: QUARK ACQUISITION CORPORATION, COLORADO
Effective date: 20141001
Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:Q LIQUIDATING TRUST F/K/A QUARK HOLDINGS, INC.;REEL/FRAME:033873/0579